US8543866B2 - Remote access diagnostic mechanism for communication devices - Google Patents

Remote access diagnostic mechanism for communication devices Download PDF

Info

Publication number
US8543866B2
US8543866B2 US12/174,278 US17427808A US8543866B2 US 8543866 B2 US8543866 B2 US 8543866B2 US 17427808 A US17427808 A US 17427808A US 8543866 B2 US8543866 B2 US 8543866B2
Authority
US
United States
Prior art keywords
data processing
processing system
diagnostic
response
error
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US12/174,278
Other versions
US20090024872A1 (en
Inventor
Harlan T. Beverly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Priority to US12/174,278 priority Critical patent/US8543866B2/en
Assigned to BIGFOOT NETWORKS, INC.. reassignment BIGFOOT NETWORKS, INC.. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BEVERLY, HARLAN T.
Publication of US20090024872A1 publication Critical patent/US20090024872A1/en
Assigned to QUALCOMM ATHEROS, INC. reassignment QUALCOMM ATHEROS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BIGFOOT NETWORKS, INC.
Assigned to QUALCOMM INCORPORATED reassignment QUALCOMM INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: QUALCOMM ATHEROS, INC.
Priority to US13/973,659 priority patent/US8909978B2/en
Application granted granted Critical
Publication of US8543866B2 publication Critical patent/US8543866B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0748Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a remote unit communicating with a single-box computer node experiencing an error/fault
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2294Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by remote test

Definitions

  • the present disclosure relates to data processing devices and more particularly to the diagnosis and correction of errors at data processing devices.
  • FIG. 4 is a flow diagram of a method of diagnosing and correcting errors at a data processing system in accordance with one embodiment of the present disclosure.
  • FIG. 6 is a flow diagram of a method of diagnosing and correcting errors at a data processing system in accordance with another embodiment of the present disclosure.
  • FIG. 7 is a block diagram of a communication system in accordance with another embodiment of the present disclosure.
  • a system and method for diagnosing and correcting errors at a data processing system includes detecting at a first device of the system, such as a network interface device, an error at a second device of the system, such as a data processor.
  • the first device communicates a help request via a network.
  • the first device receives diagnostic and error correction routines from a remote system. The first device executes the routines and provides information to the remote system to diagnose and correct errors at the second device.
  • the diagnostic device 120 is a device, such as a server or other data processing system, configured to receive help requests from the network 110 and, in response to a help request, communicate a diagnostic routine to the network 110 for execution at a remote system. Further, the diagnostic device 120 can be configured to receive diagnostic information from the executing diagnostic routine and, based on the diagnostic information, determine an error cause. Based on the error cause, the diagnostic device 120 can communicate an error correction routine configured to address the error cause. In other embodiments, an error correction routine is not communicated, and the error can be remedied in another fashion. For example, the diagnostic device 120 can dispatch replacement equipment or a repair technician to repair the remote device.
  • the data processing system 102 can be a computer system, such as a laptop computer, desktop computer, server, and the like, a portable electronic device, such as a cell phone, personal data assistant, and the like, or other data processing system.
  • the data processing system 102 includes devices, such as a network interface device 104 and a data processor 106 , configured to perform designated tasks for the data processing system 102 .
  • the diagnostic and error correction functions of the data processing system 102 will be described with respect to the network interface device 104 and the data processor 106 .
  • the described functions can be performed by other devices at the data processing system 102 , such as input/output devices, display devices (e.g. a graphics card), and the like.
  • the data processor 106 is configured to execute instructions of a computer program in order to perform designated tasks. To execute particular instructions and perform particular tasks, the data processor 106 can interact with other devices of the data processing system 102 . For example, the data processor 102 can interact with the network interface device 104 to communicate with remote devices via the network 110 .
  • the network interface device 104 is configured to detect the occurrence of an error at the data processor 106 .
  • the detected error can be an error due to a hardware failure or a software error.
  • the network interface device 104 is configured to detect catastrophic errors.
  • a catastrophic error refers to an error that renders a data processing device incapable of executing a diagnostic routine or error correction routine to diagnose or correct the error. Examples of catastrophic errors include memory failures, computer viruses, processor failures, power failures, BIOS failure, BIOS corruption, operating system corruption, application failure, driver failure and the like.
  • the network interface device 104 detects an error at the data processor 106 by polling (e.g. sending a message to) the data processor 106 and awaiting a response. If a response is not received in a designated period of time, the network interface device 104 determines an error has occurred.
  • the network interface device 104 can be configured to poll the data processor 106 in response to particular events, such as a power-on or reset event, or configured to poll the data processor 106 periodically.
  • the data processor 106 can communicate information to the network interface device indicating an error has occurred.
  • the network interface device 104 could detect insufficient system power via a power connection (not shown) to the data processor 106 .
  • the network interface device 104 In response to detecting an error at the data processor 106 , the network interface device 104 automatically sends a help request to the diagnostic device 120 via the network 110 .
  • the diagnostic device 120 In the illustrated embodiment of FIG. 1 , the diagnostic device 120 is located remotely from the data processing system 102 , thereby reducing the chance that the diagnostic device 120 will be subject to any conditions that led to the error at the data processor 106 .
  • the diagnostic device 120 communicates a diagnostic routine to the network interface device 104 via the network 110 .
  • the network interface device 104 executes the diagnostic routine at the data processing system 102 .
  • the network interface device 104 is configured to control or interact with one or more devices of the data processing system 102 in order to execute the received diagnostic routine.
  • the network interface device 104 can control a bus of the data processing system 102 in order to interact with system memory other portion of the system. This allows the network interface device 104 more flexibility in determining the cause of the error at the data processor 106 .
  • the diagnostic routine can determine diagnostic information for the data processing system 102 .
  • diagnostic information can include power or voltage levels, clock frequencies, hardware and software profiles, and the like.
  • the diagnostic information can indicate what software was being executed at the data processor device 106 when the error occurred, what hardware devices of the data processing system are functioning, and the like.
  • the diagnostic information can also indicate the configuration of the data processing system 102 , such as the type, model, and version of hardware and software present at the system.
  • the data processing system 102 can execute a helper application or driver to assist in providing the diagnostic information.
  • the diagnostic routine can query the helper application to determine what applications are running, the operating system being executed, what drivers have been loaded, and the like.
  • the network interface device 104 is able to receive and execute diagnostic and error correction routines in response to detecting an error at the data processor 106 .
  • This allows errors at the data processing system 102 to be diagnosed and corrected even when a catastrophic error occurs that renders the data processor 106 unable to diagnose or correct the error.
  • the remote diagnosis and correction can reduce the expense of error correction. For example, a service technician can remotely diagnose or correct errors, reducing the need for the technician to make an on-site visit to the data processing device 102 .
  • error diagnosis and correction functions described above can be performed by other devices of the computer device 102 .
  • a graphics card or other hardware device can be configured to perform these functions.
  • a virtual device such as a virtual machine interfacing with a hypervisor at the data processing system 102 , can be configured to perform these functions.
  • the data processing device 202 includes housing 201 , representing a physical enclosure for the illustrated portions of the system.
  • the housing encloses a processor 206 , a network interface device 204 , and a memory 208 , each of which is connected to a bus 203 .
  • the processor 206 and network interface device are configured similarly to the corresponding items of FIG. 1 .
  • the memory 208 is a computer readable medium such as volatile memory (e.g. random access memory), non-volatile memory (e.g. read only memory or flash memory), or a combination thereof.
  • the memory 208 includes an interrupt service routine (ISR) portion 215 .
  • the ISR portion 215 is a portion of memory designated for interrupt service routines of the processor 206 .
  • the processor 206 accesses the ISR portion 215 and executes instructions stored there.
  • the processor 206 can select a segment of the ISR portion 215 based on the type of interrupt, in order to execute a particular ISR associated with the interrupt.
  • the network interface device includes an authentication module 218 and a processor 219 .
  • the processor 219 is configured to, during normal operation of the processor 206 , execute designated network interface functions, including communicating information transmitted from the processor 206 via the network 110 , and providing communications from the network 110 to the processor 206 .
  • the processor 206 is configured to detect an error at the processor 206 and, in response to detecting the error, automatically communicate a help request to the diagnostic device 120 .
  • the authentication module 218 is configured to authenticate security information received via the network 110 .
  • the authentication module 218 can be a hardware module designed to perform the authentication function, or can be software executed by the processor 219 .
  • the network interface device 204 takes control of the bus 203 , the memory 208 , and other devices (not shown) of the data processing system 202 in order to execute diagnostic and error correction routines.
  • the authentication module 218 is configured to be activated in response to the processor 219 determining an error has occurred at the processor 206 . In a deactivated state (i.e. before an error at the processor 206 has been detected), the authentication module 218 will not authenticate received security information. This ensures that the network interface device 204 will not accept or authenticate security information in the absence of a detected error, reducing the chance that the diagnostic and error correction functions of the network interface device 204 can be hijacked or otherwise employed for undesired purposes.
  • the processor 219 can detect an error at the processor 206 .
  • the processor 219 can be configured to automatically communicate a help request to the diagnostic device 120 .
  • the diagnostic device 120 communicates security information (e.g. a password, security key, certificate for trusted private-public key authentication such as Secure Sockets Layer authentication, and the like) to the authentication module 218 via the network 110 .
  • security information e.g. a password, security key, certificate for trusted private-public key authentication such as Secure Sockets Layer authentication, and the like
  • the authentication module 218 authenticates the security information and, if the security information indicates the diagnostic device 120 is authorized, indicates the authorization to the processor 219 .
  • the processor 219 can be configured to take control of the bus 203 and the optionally take control of the memory 208 .
  • the processor 219 can also execute a set of pre-defined diagnostic routines in order to prepare for execution of more complex diagnostic routines provided by the diagnostic device 120 .
  • the processor 219 can perform a test of the memory 208 to ensure that it is functioning properly and can accept received diagnostic routines for storage.
  • the processor 219 can notify the diagnostic device 120 of the results of the pre-defined diagnostic routines, so that the device 120 can take appropriate action.
  • the diagnostic device 120 communicates a diagnostic routine 217 to the network interface device 204 .
  • the processor 219 stores the diagnostic routine 217 in the ISR portion 215 of the memory 208 .
  • the processor 219 instructs the processor 206 to be placed into a loop or other state whereby the processor 206 does not write to the memory 208 . This ensures that the diagnostic routine 217 can be safely written to the ISR portion 215 without the processor 206 writing to the same location, overwriting the diagnostic routine, or otherwise having the processor 206 enter an undesired state.
  • the processor 219 sends an interrupt notification to the processor 206 .
  • the processor 206 In response the processor 206 automatically executes the instructions at the ISR portion 215 . Thus, the processor 206 automatically executes the diagnostic routine 217 . Accordingly, in the illustrated embodiment, the interrupt functions of the processor 206 are used by the network interface device 204 in order to allow the processor 206 to execute a diagnostic routine.
  • Execution of the diagnostic routine 217 can result in diagnostic information being provided by the processor 206 or other devices of the data processing system 202 .
  • the diagnostic information is communicated to the processor 219 , which in turn communicates the information to the diagnostic device 120 via the network 110 .
  • the diagnostic device 120 can communicate an error correction routine 221 to the network interface device 204 .
  • the processor 219 can store and execute the error correction routine 221 in similar fashion to that described with respect to the diagnostic routine 217 .
  • the error correction routine 221 can be stored at the ISR portion 215 and executed by providing an interrupt request to the processor 206 .
  • the data processing system 302 includes a processor 306 , a network interface device 304 , and a memory 308 , each of which is connected to a bus 303 .
  • the processor 306 , network interface device 304 , and memory 308 are configured similarly to the corresponding items of FIG. 2 .
  • the network interface device 304 includes an authentication module 318 and a processor 319 , each configured similarly to the corresponding items of FIG. 2 .
  • the memory 308 stores a device driver 316 .
  • the device driver 316 includes device control routines 323 , which are a set of routines configured to control the network interface device 304 .
  • the processor executes the device driver 316 and in particular executes the device control routines 323 in order to configure and interact with the network interface device 304 .
  • the network interface device 304 sends a help request and receives security information in similar fashion to that described above with respect to FIG. 2 .
  • the network interface device 304 communicates with the device driver 316 to invoke execution of the diagnostic routine 317 .
  • the diagnostic routine 317 is a portion of the device driver 316 .
  • the diagnostic routine 317 is a pre-defined routine of the device driver.
  • the diagnostic routine 317 is received from the diagnostic device 120 as normal network traffic and incorporated in the device driver 316 .
  • the device driver 316 can execute the diagnostic routine 317 by creating an executable file based on the routine and invoking execution of the executable file via a shell command.
  • the device driver 316 can be configured to execute the diagnostic routine 317 by replacing portions of its own run-time memory algorithms with the diagnostic routine 317 and ‘jumping’ execution to the new run-time memory location.
  • the diagnostic device can remotely request, via the network interface device 304 , that the device driver 316 invoke the error correction routine 321 .
  • the error correction routine 321 is a pre-defined routine of the device driver.
  • the error correction routine 312 is received from the diagnostic device 120 and incorporated in the device driver 316 .
  • the network interface device 304 can use a device driver to perform diagnostic and error correction operations. This allows the network interface device 304 to take advantage of the existing communication relationship with the device driver 316 in order to perform these functions.
  • the network interface device 304 is configured to receive and process communications from the network 110 .
  • the network interface device 304 can be configured to indicate, via a message, flag, command, and the like that particular data being communicated is from the diagnostic device 120 and not from a malicious source.
  • the network interface device has previously authenticated the diagnostic device 120 , thereby completing the trusted relationship.
  • a flow diagram of a particular embodiment of a method of diagnosing and correcting errors at a data processing system is illustrated.
  • a first data processing device such as a network interface device
  • detects an error at a second data processing device such as a data processor.
  • the network interface automatically sends a help request via a network to a remote device.
  • the network interface device receives security information from the remote device in response to the help request.
  • the network interface device authenticates the remote device based on the received security information.
  • the network interface device receives a diagnostic routine from the remote device.
  • the network interface device executes the diagnostic routine.
  • the network interface device reports diagnostic results from the diagnostic routine to the remote device via the network.
  • the network interface device receives an error correction routine from the remote device based on the communicated diagnostic results.
  • the network interface device executes the error correction routine to correct the diagnosed error.
  • a network interface device tests a memory of a data processing system.
  • the network interface device receives a diagnostic routine from a remote device.
  • the network interface device places a data processor in a loop state, whereby the data processor cannot write to an interrupt service routine (ISR) portion of memory.
  • ISR interrupt service routine
  • the network interface device stores the received diagnostic routine at the ISR portion of memory.
  • the network interface device communicates an interrupt request to the data processor so that the data processor executes instructions stored at ISR portion (i.e. so that the data processor executes the stored diagnostic routine).
  • the network interface device receives diagnostic results from the diagnostic routine and provides the diagnostic results to the remote device.
  • the network interface device receives an error correction routine from the remote device.
  • the network interface device stores the error correction routine at the ISR portion of memory.
  • the network interface device communicates an interrupt request to the data processor device, so that the data processor executes the error correction routine, thereby correcting the detected error.
  • FIG. 6 a flow diagram of another particular embodiment of a method of diagnosing and correcting a detected error at a data processing system is illustrated.
  • a network interface device tests a memory of a data processing system in response to detecting an error at a data processor of the system.
  • the network interface device receives a diagnostic routine from a remote device via a network.
  • the network interface device provides the received diagnostic routine to a device driver for the network interface device.
  • the data processor executes the diagnostic routine at the device driver.
  • the network interface device receives diagnostic results from the diagnostic routine and provides the diagnostic results to the remote device via the network.
  • the network interface device receives an error correction routine from the remote device.
  • the network interface device provides the error correction routine to the device driver.
  • the data processor executes the error correction routine at the device driver in order to correct the error.
  • the communication system 700 includes a data processing system 702 , a network 710 , and a diagnostic device 720 .
  • the data processing system 702 and diagnostic device 720 are each connected to the network 710 .
  • the network 710 and the diagnostic device 720 are each configured similarly to the corresponding items of FIG. 1 .
  • the data processing system 702 is configured to execute virtual devices, such as virtual devices 704 and 706 .
  • the data processing system 702 can include a hypervisor (not shown) or other module configured to provide an interface between the virtual devices and a processor, so that each of the virtual devices 704 and 706 represents a virtual machine.
  • the virtual devices 704 and 706 can each detect errors at the other and, in response to detecting an error, automatically send a help request to the diagnostic device 720 .
  • the diagnostic device 720 provides diagnostic and error correction routines in similar fashion to that described above.
  • the virtual device that communicated the help request executes the diagnostic and error correction routines, in similar fashion to those described above with respect to the network interface device, in order to diagnose and correct the error at the other virtual device.
  • the techniques described herein for diagnosing and correcting errors can be applied to virtual as well as physical data processing devices.

Abstract

A method for diagnosing and correcting errors at a data processing system is disclosed includes detecting at a first device of the system, such as a network interface device, an error at a second device of the system, such as a data processor. In response to detecting the error, the first device communicates a help request via a network. In response to the help request, the first device receives diagnostic and error correction routines from a remote system. The first device executes the routines and provides information to the remote system to diagnose and correct errors at the second device.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
This application claims priority to U.S. Provisional Patent Application No. 60/950,989 entitled “METHOD, SYSTEM, AND DEVICE FOR RELIABLE SECURE REMOTE ACCESS,” filed on Jul. 20, 2007, which is assigned to the current assignee hereof and is incorporated herein by reference in its entirety.
FIELD OF THE DISCLOSURE
The present disclosure relates to data processing devices and more particularly to the diagnosis and correction of errors at data processing devices.
BACKGROUND
The use of data processing systems, such as computer devices, cell phones, personal data assistants, and the like, continues to increase. Further, the functions for which data processing systems are employed also continue to grow. This has led to a commensurate increase in the complexity of the data processing device. For example, data processing systems can frequently employ multiple processors, as well as specialized hardware such as graphics cards and input/output controllers. However, as the complexity of the data processing device has grown, so too has the difficulty in diagnosing the cause of errors at a particular system. This difficulty is exacerbated when the error is a catastrophic error that renders the data processing device partially inoperable or inaccessible to a system user. Accordingly, an improved method and device for diagnosing and correcting errors at a data processing system would be useful.
BRIEF DESCRIPTION OF THE DRAWINGS
The present disclosure may be better understood, and its numerous features and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
FIG. 1 is a block diagram of a communication system in accordance with one embodiment of the present disclosure.
FIG. 2 is a block diagram of a particular embodiment of a data processing system of FIG. 1.
FIG. 3 is a block diagram of an alternative embodiment of a data processing system of FIG. 1.
FIG. 4 is a flow diagram of a method of diagnosing and correcting errors at a data processing system in accordance with one embodiment of the present disclosure.
FIG. 5 is a flow diagram of a method of diagnosing and correcting errors at a data processing system in accordance with another embodiment of the present disclosure.
FIG. 6 is a flow diagram of a method of diagnosing and correcting errors at a data processing system in accordance with another embodiment of the present disclosure.
FIG. 7 is a block diagram of a communication system in accordance with another embodiment of the present disclosure.
The use of the same reference symbols in different drawings indicates similar or identical items.
DETAILED DESCRIPTION
A system and method for diagnosing and correcting errors at a data processing system is disclosed. The method includes detecting at a first device of the system, such as a network interface device, an error at a second device of the system, such as a data processor. In response to detecting the error, the first device communicates a help request via a network. In response to the help request, the first device receives diagnostic and error correction routines from a remote system. The first device executes the routines and provides information to the remote system to diagnose and correct errors at the second device.
Referring to FIG. 1, a block diagram of a particular embodiment of a communication system 100 is illustrated. The communication system 100 includes a data processing system 102, a network 110, and a diagnostic device 120. The data processing system 102 and diagnostic device 120 are each connected to the network 110. The network 110 provides a physical communication layer for communications between the diagnostic device 120 and the data processing system 102. For example, the network 110 can be a packet-switched network including one or more routers, servers, and the like, configured to route packets to a destination based on address information associated with each packet. In this configuration, the network 110 can receive packets from each of the diagnostic device 120 and the data processing device 102, and communicate the packets to the other. In a particular embodiment, the network 110 is a wide-area network, such as the Internet. In another embodiment, the network 110 is a local area network. In still another embodiment, the network 110 is a combination of one or more wide area networks and one or more local area networks.
The diagnostic device 120 is a device, such as a server or other data processing system, configured to receive help requests from the network 110 and, in response to a help request, communicate a diagnostic routine to the network 110 for execution at a remote system. Further, the diagnostic device 120 can be configured to receive diagnostic information from the executing diagnostic routine and, based on the diagnostic information, determine an error cause. Based on the error cause, the diagnostic device 120 can communicate an error correction routine configured to address the error cause. In other embodiments, an error correction routine is not communicated, and the error can be remedied in another fashion. For example, the diagnostic device 120 can dispatch replacement equipment or a repair technician to repair the remote device.
In one embodiment, the diagnostic device 120 can be controlled by a user, referred to herein as a service technician. In this embodiment, the diagnostic device is a computer system, such as a server, desktop computer, and the like, configured to display information to the service technician and respond to the technician's instructions. The service technician can monitor help requests received at the diagnostic device 120 and, based on the help request, select a particular diagnostic routine from a set of diagnostic options for communication to the remote device. In addition, the service technician can monitor received diagnostic information and, based on the information, select an error correction routine from a set of error correction options for communication to the remote device. In other embodiments, the diagnostic device 120 can be automated to select the diagnostic and error correction routines without intervention by a user, or to automatically send new equipment or dispatch a repair technician.
The data processing system 102 can be a computer system, such as a laptop computer, desktop computer, server, and the like, a portable electronic device, such as a cell phone, personal data assistant, and the like, or other data processing system. The data processing system 102 includes devices, such as a network interface device 104 and a data processor 106, configured to perform designated tasks for the data processing system 102. For purposes of illustration, the diagnostic and error correction functions of the data processing system 102 will be described with respect to the network interface device 104 and the data processor 106. However, it will be appreciated that the described functions can be performed by other devices at the data processing system 102, such as input/output devices, display devices (e.g. a graphics card), and the like.
In the illustrated embodiment of FIG. 1, the data processor 106 is configured to execute instructions of a computer program in order to perform designated tasks. To execute particular instructions and perform particular tasks, the data processor 106 can interact with other devices of the data processing system 102. For example, the data processor 102 can interact with the network interface device 104 to communicate with remote devices via the network 110.
The network interface device 104 is configured to transmit communications provided by the data processor 106 via the network 110. In particular, the network interface device 104 provides a physical and logical communication interface to the network for communications provided by data processor 106. In addition, the network interface device 104 is configured to provide a physical and logical communication interface to the data processor 106 for communications received from the network 110.
In addition, the network interface device 104 is configured to detect the occurrence of an error at the data processor 106. The detected error can be an error due to a hardware failure or a software error. Further, in one embodiment, the network interface device 104 is configured to detect catastrophic errors. As used herein, a catastrophic error refers to an error that renders a data processing device incapable of executing a diagnostic routine or error correction routine to diagnose or correct the error. Examples of catastrophic errors include memory failures, computer viruses, processor failures, power failures, BIOS failure, BIOS corruption, operating system corruption, application failure, driver failure and the like.
In one embodiment, the network interface device 104 detects an error at the data processor 106 by polling (e.g. sending a message to) the data processor 106 and awaiting a response. If a response is not received in a designated period of time, the network interface device 104 determines an error has occurred. The network interface device 104 can be configured to poll the data processor 106 in response to particular events, such as a power-on or reset event, or configured to poll the data processor 106 periodically. In another embodiment, the data processor 106 can communicate information to the network interface device indicating an error has occurred. In yet another embodiment, the network interface device 104 could detect insufficient system power via a power connection (not shown) to the data processor 106. In still another embodiment, the network interface device 104 could detect a system bus error via a bus error signal from the data processor 106. In still another embodiment, the network interface device 104 could detect a BIOS problem by monitoring the system bus activity for BIOS processing or failure commands or indications. In yet another embodiment, the network interface device 104 could detect an error by monitoring data packets flowing through it for signs of virus or spyware infection or other network traffic indicating a problem state.
In response to detecting an error at the data processor 106, the network interface device 104 automatically sends a help request to the diagnostic device 120 via the network 110. In the illustrated embodiment of FIG. 1, the diagnostic device 120 is located remotely from the data processing system 102, thereby reducing the chance that the diagnostic device 120 will be subject to any conditions that led to the error at the data processor 106. In response to the help request, the diagnostic device 120 communicates a diagnostic routine to the network interface device 104 via the network 110. The network interface device 104 executes the diagnostic routine at the data processing system 102.
In an embodiment, the network interface device 104 is configured to control or interact with one or more devices of the data processing system 102 in order to execute the received diagnostic routine. For example, the network interface device 104 can control a bus of the data processing system 102 in order to interact with system memory other portion of the system. This allows the network interface device 104 more flexibility in determining the cause of the error at the data processor 106.
In an embodiment, the diagnostic routine can determine diagnostic information for the data processing system 102. Examples of diagnostic information can include power or voltage levels, clock frequencies, hardware and software profiles, and the like. For example, the diagnostic information can indicate what software was being executed at the data processor device 106 when the error occurred, what hardware devices of the data processing system are functioning, and the like. The diagnostic information can also indicate the configuration of the data processing system 102, such as the type, model, and version of hardware and software present at the system. In an embodiment, the data processing system 102 can execute a helper application or driver to assist in providing the diagnostic information. The diagnostic routine can query the helper application to determine what applications are running, the operating system being executed, what drivers have been loaded, and the like.
The network interface device 104 can communicate the diagnostic information to the diagnostic device 120 via the network 110. In response to the diagnostic information, the diagnostic device 120 can communicate an error correction routine to the network device 104, which executes the routine at the data processing system 102. For example, based on the diagnostic information the diagnostic device 120 can determine that the error at the data processor 106 is the result of a computer virus, and provide the network interface device with a virus cleaning routine. The network device executes the virus cleaning routine to restore the data processor 106 to a fully operational state.
Accordingly, as illustrated, the network interface device 104 is able to receive and execute diagnostic and error correction routines in response to detecting an error at the data processor 106. This allows errors at the data processing system 102 to be diagnosed and corrected even when a catastrophic error occurs that renders the data processor 106 unable to diagnose or correct the error. The remote diagnosis and correction can reduce the expense of error correction. For example, a service technician can remotely diagnose or correct errors, reducing the need for the technician to make an on-site visit to the data processing device 102.
It will be appreciated that, as indicated above, the error diagnosis and correction functions described above can be performed by other devices of the computer device 102. For example, a graphics card or other hardware device can be configured to perform these functions. In addition, a virtual device, such as a virtual machine interfacing with a hypervisor at the data processing system 102, can be configured to perform these functions.
Referring to FIG. 2, a block diagram of a particular embodiment of a data processing system 202, corresponding to the data processing system 102 of FIG. 1, is illustrated. The data processing device 202 includes housing 201, representing a physical enclosure for the illustrated portions of the system. In particular, the housing encloses a processor 206, a network interface device 204, and a memory 208, each of which is connected to a bus 203. The processor 206 and network interface device are configured similarly to the corresponding items of FIG. 1. The memory 208 is a computer readable medium such as volatile memory (e.g. random access memory), non-volatile memory (e.g. read only memory or flash memory), or a combination thereof.
In the illustrated embodiment of FIG. 2, the memory 208 includes an interrupt service routine (ISR) portion 215. The ISR portion 215 is a portion of memory designated for interrupt service routines of the processor 206. In particular, in response to an interrupt communicated via the bus 203 or via a designated input pin (not shown), the processor 206 accesses the ISR portion 215 and executes instructions stored there. In an embodiment, the processor 206 can select a segment of the ISR portion 215 based on the type of interrupt, in order to execute a particular ISR associated with the interrupt.
The network interface device includes an authentication module 218 and a processor 219. The processor 219 is configured to, during normal operation of the processor 206, execute designated network interface functions, including communicating information transmitted from the processor 206 via the network 110, and providing communications from the network 110 to the processor 206. In addition, the processor 206 is configured to detect an error at the processor 206 and, in response to detecting the error, automatically communicate a help request to the diagnostic device 120.
The authentication module 218 is configured to authenticate security information received via the network 110. The authentication module 218 can be a hardware module designed to perform the authentication function, or can be software executed by the processor 219. In response to the authentication module authenticating received security information, the network interface device 204 takes control of the bus 203, the memory 208, and other devices (not shown) of the data processing system 202 in order to execute diagnostic and error correction routines. In an embodiment, the authentication module 218 is configured to be activated in response to the processor 219 determining an error has occurred at the processor 206. In a deactivated state (i.e. before an error at the processor 206 has been detected), the authentication module 218 will not authenticate received security information. This ensures that the network interface device 204 will not accept or authenticate security information in the absence of a detected error, reducing the chance that the diagnostic and error correction functions of the network interface device 204 can be hijacked or otherwise employed for undesired purposes.
In operation, the processor 219 can detect an error at the processor 206. In response, the processor 219 can be configured to automatically communicate a help request to the diagnostic device 120. In response to the help request, the diagnostic device 120 communicates security information (e.g. a password, security key, certificate for trusted private-public key authentication such as Secure Sockets Layer authentication, and the like) to the authentication module 218 via the network 110. The authentication module 218 authenticates the security information and, if the security information indicates the diagnostic device 120 is authorized, indicates the authorization to the processor 219. In response to receiving the authorization information, the processor 219 can be configured to take control of the bus 203 and the optionally take control of the memory 208. The processor 219 can also execute a set of pre-defined diagnostic routines in order to prepare for execution of more complex diagnostic routines provided by the diagnostic device 120. For example, the processor 219 can perform a test of the memory 208 to ensure that it is functioning properly and can accept received diagnostic routines for storage. The processor 219 can notify the diagnostic device 120 of the results of the pre-defined diagnostic routines, so that the device 120 can take appropriate action.
The diagnostic device 120 communicates a diagnostic routine 217 to the network interface device 204. In response, the processor 219 stores the diagnostic routine 217 in the ISR portion 215 of the memory 208. In one embodiment, prior to storing the diagnostic routine 217, the processor 219 instructs the processor 206 to be placed into a loop or other state whereby the processor 206 does not write to the memory 208. This ensures that the diagnostic routine 217 can be safely written to the ISR portion 215 without the processor 206 writing to the same location, overwriting the diagnostic routine, or otherwise having the processor 206 enter an undesired state. After storing the diagnostic routine 217 to the ISR portion 215, the processor 219 sends an interrupt notification to the processor 206. In response the processor 206 automatically executes the instructions at the ISR portion 215. Thus, the processor 206 automatically executes the diagnostic routine 217. Accordingly, in the illustrated embodiment, the interrupt functions of the processor 206 are used by the network interface device 204 in order to allow the processor 206 to execute a diagnostic routine.
Execution of the diagnostic routine 217 can result in diagnostic information being provided by the processor 206 or other devices of the data processing system 202. The diagnostic information is communicated to the processor 219, which in turn communicates the information to the diagnostic device 120 via the network 110. In response to the diagnostic information, the diagnostic device 120 can communicate an error correction routine 221 to the network interface device 204. The processor 219 can store and execute the error correction routine 221 in similar fashion to that described with respect to the diagnostic routine 217. In particular, the error correction routine 221 can be stored at the ISR portion 215 and executed by providing an interrupt request to the processor 206.
Referring to FIG. 3, a block diagram of a particular embodiment of a data processing system 302, corresponding to the data processing system 102 of FIG. 1, is illustrated. The data processing system 302 includes a processor 306, a network interface device 304, and a memory 308, each of which is connected to a bus 303. The processor 306, network interface device 304, and memory 308 are configured similarly to the corresponding items of FIG. 2. For example, the network interface device 304 includes an authentication module 318 and a processor 319, each configured similarly to the corresponding items of FIG. 2.
In the illustrated embodiment of FIG. 3, the memory 308 stores a device driver 316. The device driver 316 includes device control routines 323, which are a set of routines configured to control the network interface device 304. During normal operation of the processor 306, the processor executes the device driver 316 and in particular executes the device control routines 323 in order to configure and interact with the network interface device 304. In response to detecting an error, the network interface device 304 sends a help request and receives security information in similar fashion to that described above with respect to FIG. 2. In response to authenticating the security information, the network interface device 304 communicates with the device driver 316 to invoke execution of the diagnostic routine 317. As illustrated, the diagnostic routine 317 is a portion of the device driver 316. In one embodiment, the diagnostic routine 317 is a pre-defined routine of the device driver. In another embodiment, the diagnostic routine 317 is received from the diagnostic device 120 as normal network traffic and incorporated in the device driver 316. The device driver 316 can execute the diagnostic routine 317 by creating an executable file based on the routine and invoking execution of the executable file via a shell command. In another embodiment, the device driver 316 can be configured to execute the diagnostic routine 317 by replacing portions of its own run-time memory algorithms with the diagnostic routine 317 and ‘jumping’ execution to the new run-time memory location.
Further, based on diagnostic information generated by the diagnostic routine 316, the diagnostic device can remotely request, via the network interface device 304, that the device driver 316 invoke the error correction routine 321. In one embodiment, the error correction routine 321 is a pre-defined routine of the device driver. In another embodiment, the error correction routine 312 is received from the diagnostic device 120 and incorporated in the device driver 316. Accordingly, as illustrated, the network interface device 304 can use a device driver to perform diagnostic and error correction operations. This allows the network interface device 304 to take advantage of the existing communication relationship with the device driver 316 in order to perform these functions. As explained above, the network interface device 304 is configured to receive and process communications from the network 110. Further, the network interface device 304 can be configured to indicate, via a message, flag, command, and the like that particular data being communicated is from the diagnostic device 120 and not from a malicious source. The network interface device has previously authenticated the diagnostic device 120, thereby completing the trusted relationship.
Referring to FIG. 4, a flow diagram of a particular embodiment of a method of diagnosing and correcting errors at a data processing system is illustrated. At block 402, a first data processing device, such as a network interface device, detects an error at a second data processing device, such as a data processor. At block 404, the network interface automatically sends a help request via a network to a remote device. At block 406, the network interface device receives security information from the remote device in response to the help request.
At block 410, the network interface device authenticates the remote device based on the received security information. At block 412, in response to authenticating the security information, the network interface device receives a diagnostic routine from the remote device. At block 414, the network interface device executes the diagnostic routine. At block 416, the network interface device reports diagnostic results from the diagnostic routine to the remote device via the network. At block 418, the network interface device receives an error correction routine from the remote device based on the communicated diagnostic results. At block 420, the network interface device executes the error correction routine to correct the diagnosed error.
Referring to FIG. 5, a flow diagram of another particular embodiment of a method of diagnosing and correcting a detected error at a data processing system is illustrated. At block 502, a network interface device tests a memory of a data processing system. At block 504, the network interface device receives a diagnostic routine from a remote device. At block 506, the network interface device places a data processor in a loop state, whereby the data processor cannot write to an interrupt service routine (ISR) portion of memory.
At block 510, the network interface device stores the received diagnostic routine at the ISR portion of memory. At block 512, the network interface device communicates an interrupt request to the data processor so that the data processor executes instructions stored at ISR portion (i.e. so that the data processor executes the stored diagnostic routine). At block 514, the network interface device receives diagnostic results from the diagnostic routine and provides the diagnostic results to the remote device. At block 516, based on the communicated diagnostic results, the network interface device receives an error correction routine from the remote device. At block 518, the network interface device stores the error correction routine at the ISR portion of memory. At block 520, the network interface device communicates an interrupt request to the data processor device, so that the data processor executes the error correction routine, thereby correcting the detected error.
Referring to FIG. 6, a flow diagram of another particular embodiment of a method of diagnosing and correcting a detected error at a data processing system is illustrated.
At block 602, a network interface device tests a memory of a data processing system in response to detecting an error at a data processor of the system. At block 604, the network interface device receives a diagnostic routine from a remote device via a network. At block 606, the network interface device provides the received diagnostic routine to a device driver for the network interface device. At block 610, the data processor executes the diagnostic routine at the device driver.
At block 612, the network interface device receives diagnostic results from the diagnostic routine and provides the diagnostic results to the remote device via the network. At block 614, based on the communicated diagnostic results, the network interface device receives an error correction routine from the remote device. At block 616, the network interface device provides the error correction routine to the device driver. At block 618, the data processor executes the error correction routine at the device driver in order to correct the error.
Referring to FIG. 7, a block diagram of a particular embodiment of a communication system 700 is illustrated. The communication system 700 includes a data processing system 702, a network 710, and a diagnostic device 720. The data processing system 702 and diagnostic device 720 are each connected to the network 710. The network 710 and the diagnostic device 720 are each configured similarly to the corresponding items of FIG. 1.
The data processing system 702 is configured to execute virtual devices, such as virtual devices 704 and 706. For example, the data processing system 702 can include a hypervisor (not shown) or other module configured to provide an interface between the virtual devices and a processor, so that each of the virtual devices 704 and 706 represents a virtual machine. In operation, the virtual devices 704 and 706 can each detect errors at the other and, in response to detecting an error, automatically send a help request to the diagnostic device 720. In response to the help request, the diagnostic device 720 provides diagnostic and error correction routines in similar fashion to that described above. The virtual device that communicated the help request executes the diagnostic and error correction routines, in similar fashion to those described above with respect to the network interface device, in order to diagnose and correct the error at the other virtual device. Thus, the techniques described herein for diagnosing and correcting errors can be applied to virtual as well as physical data processing devices.
The above disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments that fall within the true spirit and scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.

Claims (24)

What is claimed is:
1. A method, comprising:
detecting, at a first data processing device, an error at a first data processing system of a network;
in response to detecting the error at the first data processing system,
enabling one or more operations for authenticating a second data processing system of the network at the first data processing device;
automatically transmitting a help request from the first data processing device via the network to the second data processing system;
receiving, from the second data processing system, authentication information at the first data processing device in response to transmitting the help request to the second data processing system;
authenticating the second data processing system at the first data processing device based on the authentication information received from the second data processing system;
receiving a diagnostic request from the second data processing system in response to authenticating the second data processing system;
executing a diagnostic routine at the first data processing device to determine diagnostic information associated with the first data processing system in response to receiving the diagnostic request;
transmitting the diagnostic information associated with the first data processing system to the second data processing system;
receiving an error correction routine from the second data processing system in response to said authenticating the second data processing system and in response to said transmitting the diagnostic information;
executing the error correction routine at the first data processing device to resolve the error at the first data processing system; and
disabling the one or more operations for authenticating the second data processing system at the first data processing device in response to detecting that the error at the first data processing system is resolved.
2. The method of claim 1, wherein said receiving the diagnostic request comprises receiving the diagnostic routine in the diagnostic request from the second data processing system via the network.
3. The method of claim 1, wherein said executing the diagnostic routine comprises:
storing the diagnostic routine at a memory portion of the first data processing system, the memory portion associated with an interrupt service routine of the first data processing system;
communicating an interrupt to the first data processing system;
executing the diagnostic routine at the first data processing system in response to receiving the interrupt.
4. The method of claim 3, further comprising placing the first data processing system in a loop state while storing the diagnostic routine at the memory portion.
5. The method of claim 3, further comprising:
performing a memory diagnostic on the memory portion prior to storing the diagnostic routine to determine whether the memory portion is operational for storage of the diagnostic routine; and
notifying the second data processing system regarding whether the memory portion is operational for storage of the diagnostic routine in response to said performing the memory diagnostic,
wherein said receiving the diagnostic request from the second data processing system is in response to authenticating the second data processing system and determining that the memory portion is operational for storage of the diagnostic routine.
6. The method of claim 1, wherein said executing the diagnostic routine comprises communicating a first request from the first data processing device to a device driver at the first data processing system, the first request comprising a request for the device driver to execute the diagnostic routine.
7. The method of claim 6, wherein executing the diagnostic routine further comprises communicating the diagnostic routine to the device driver.
8. The method of claim 1, wherein the first data processing device comprises a network interface card.
9. The method of claim 8, wherein the first data processing system comprises a data processor, and wherein the error indicates the data processor is unable to execute the diagnostic routine.
10. The method of claim 1, wherein the first data processing device comprises a first virtual device, and the first data processing system comprises a second virtual device.
11. The method of claim 1, wherein said detecting the error comprises:
communicating a message to the first data processing system; and
determining the error in response to determining a response to the message has not been received within a defined period of time.
12. The method of claim 1, wherein if the error is detected at a data processor of the first data processing system, said detecting at the first data processing device the error at the first data processing system comprises one of:
detecting that a power level associated with the data processor is below a threshold power level; or
receiving, at the first data processing device and from the data processor, one or more error notifications indicating the error at the data processor.
13. A method, comprising:
detecting, at a first data processing device, an error at a first data processing system;
in response to detecting the error,
storing, from the first data processing device via a network, a diagnostic routine at a memory portion of the first data processing system, the memory portion associated with an interrupt service routine of the first data processing system;
providing a first interrupt to the first data processing system; and
executing the diagnostic routine at the first data processing system in response to receiving the first interrupt;
storing, from the first data processing device, an error correction routine at the memory portion of the first data processing system;
providing a second interrupt to the first data processing system; and
executing the error correction routine at the first data processing system in response to receiving the second interrupt.
14. The method of claim 13, further comprising:
executing a memory diagnostic on the memory portion prior to storing the diagnostic routine.
15. The method of claim 13, further comprising:
placing the first data processing system in a loop configuration while storing the diagnostic routine.
16. The method of claim 13, further comprising:
receiving the diagnostic routine via a network in response to determining the error.
17. The method of claim 13, wherein the first data processing device comprises a network interface device, and wherein the first data processing system comprises a data processor.
18. A method, comprising:
detecting, at a first data processing device of a first data processing system, an error at the first data processing system;
in response to detecting the error,
enabling one or more operations for authenticating a device driver of the first data processing system at the first data processing device in response to detecting the error at the first data processing system, wherein the device driver is configured to control the first data processing device;
automatically transmitting a help request from the first data processing device to the device driver;
receiving authentication information at the first data processing device in response to said transmitting the help request to the device driver;
authenticating the device driver at the first data processing device based on the authentication information received from the device driver;
communicating, from the first data processing device, a diagnostic request to the device driver of the first data processing system, wherein the diagnostic request comprises an indication of a diagnostic routine;
executing, by the device driver of the first data processing system, the diagnostic routine of the device driver to determine diagnostic information, in response to said receiving the diagnostic request;
communicating, from the first data processing device, an error correction request to the device driver, wherein the error correction request comprises an indication of an error correction routine based, at least in part, on the diagnostic information associated with the first data processing system determined in response to said executing the diagnostic routine of the device driver;
executing, by the device driver of the first data processing system, the error correction routine of the device driver to resolve the error at the first data processing system, in response to receiving the error correction request; and
disabling the one or more operations for authenticating the device driver at the first data processing device in response to detecting that the error at the first data processing system is resolved.
19. The method of claim 18, wherein communicating the diagnostic request comprises providing the diagnostic routine to the device driver.
20. The method of claim 18, wherein communicating the error correction request comprises one of:
receiving the error correction routine from a second data processing device;
storing the error correction routine in a memory portion associated with the device driver; and
communicating the error correction request to the device driver to notify the device driver to execute the error correction routine stored in the memory portion associated with the device driver; or
indicating, in the error correction request, a first of a plurality of error correction routines associated with the device driver that is to be executed.
21. A device, comprising:
a first processor device;
a network interface comprising a processor, wherein the network interface is coupled to the first processor device, wherein the network interface is configured to:
detect an error at the first processor device;
enable one or more operations for authenticating a remote device at the network interface in response to detecting the error at the first processor device;
automatically send a help request to the remote device via a network in response to detecting an error at the first processor device;
receive, from the remote device, authentication information in response to sending the help request to the remote device;
authenticate the remote device based on the authentication information received from the remote device;
receive a diagnostic routine from the remote device in response to authenticating the remote device;
execute the diagnostic routine to determine diagnostic information associated with the first processor device in response to receiving the diagnostic routine;
transmit the diagnostic information associated with the first processor device to the remote device;
receive an error correction routine from the remote device in response to transmitting the diagnostic information associated with the first processor device to the remote device;
execute the error correction routine to resolve the error at the first processor device; and
disable the one or more operations for authenticating the remote system at the network interface in response to detecting that the error at the first processor device is resolved.
22. A method comprising:
detecting, at a first data processing device, an error at a first system of a network;
in response to detecting the error at the first system,
automatically transmitting a help request from the first data processing device via a network to a second data processing system of the network;
receiving, from the second data processing system, authentication information at the first data processing device in response to transmitting the help request to the second data processing system;
authenticating the second data processing system at the first data processing device based on the authentication information received from the second data processing system;
performing a memory diagnostic on a memory portion of the first system to determine whether the memory portion is operational for storage of a diagnostic routine;
notifying the second data processing system regarding whether the memory portion is operational for storage of the diagnostic routine in response to said performing the memory diagnostic on the memory portion;
receiving the diagnostic routine from the second data processing system in response to said authenticating the second data processing system and in response to determining that the memory portion is operational for storage of the diagnostic routine;
executing the diagnostic routine at the first data processing device to determine diagnostic information associated with the first system in response to said receiving the diagnostic routine, wherein said executing the diagnostic routine comprises,
storing the diagnostic routine at a memory portion of the first system, the memory portion associated with an interrupt service routine of the first system,
communicating an interrupt to the first data processing device, and
executing the diagnostic routine at the first data processing device in response to receiving the interrupt;
transmitting the diagnostic information associated with the first system to the second data processing system;
receiving an error correction routine from the second data processing system in response to said authenticating the second data processing system and in response to said transmitting the diagnostic information; and
executing the error correction routine at the first data processing device to resolve the error at the first system.
23. A method comprising:
detecting, at a first data processing device, an error at a first system of a network, wherein said detecting at the first data processing device the error at the first system comprises one of detecting that a power level associated with a data processor of the first system is below a threshold power level or receiving one or more error notifications from the data processor indicating the error at the data processor;
in response to detecting the error at the first system,
automatically transmitting a help request from the first data processing device via the network to a second data processing system of the network;
receiving, from the second data processing system, authentication information at the first data processing device in response to transmitting the help request to the second data processing system;
authenticating the second data processing system at the first data processing device based on the authentication information received from the second data processing system;
receiving a diagnostic routine from the second data processing system in response to said authenticating the second data processing system;
executing a diagnostic routine at the first data processing device to determine diagnostic information associated with the first system in response to receiving the diagnostic routine;
transmitting the diagnostic information associated with the first system to the second data processing system;
receiving an error correction routine from the second data processing system in response to said authenticating the second data processing system and in response to said transmitting the diagnostic information; and
executing the error correction routine at the first data processing device to resolve the error at the first system.
24. A non-transitory machine-readable storage media having stored therein instructions, which when executed by one or more processors causes the one or more processors to perform operations that comprise:
detecting, at a first data processing device, an error at a first data processing system of a network;
in response to detecting the error at the first data processing system,
enabling one or more operations for authenticating a second data processing system of the network at the first data processing device;
automatically transmitting a help request from the first data processing device via the network to the second data processing system;
receiving, from the second data processing system, authentication information at the first data processing device in response to transmitting the help request to the second data processing system;
authenticating the second data processing system at the first data processing device based on the authentication information received from the second data processing system;
receiving a diagnostic request from the second data processing system in response to authenticating the second data processing system;
executing a diagnostic routine at the first data processing device to determine diagnostic information associated with the first data processing system in response to receiving the diagnostic request;
transmitting the diagnostic information associated with the first data processing system to the second data processing system;
receiving an error correction routine from the second data processing system in response to said authenticating the second data processing system and in response to said transmitting the diagnostic information;
executing the error correction routine at the first data processing device to resolve the error at the first data processing system; and
disabling the one or more operations for authenticating the second data processing system at the first data processing device in response to detecting that the error at the first data processing system is resolved.
US12/174,278 2007-07-20 2008-07-16 Remote access diagnostic mechanism for communication devices Active 2030-08-10 US8543866B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/174,278 US8543866B2 (en) 2007-07-20 2008-07-16 Remote access diagnostic mechanism for communication devices
US13/973,659 US8909978B2 (en) 2007-07-20 2013-08-22 Remote access diagnostic mechanism for communication devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US95098907P 2007-07-20 2007-07-20
US12/174,278 US8543866B2 (en) 2007-07-20 2008-07-16 Remote access diagnostic mechanism for communication devices

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/973,659 Continuation US8909978B2 (en) 2007-07-20 2013-08-22 Remote access diagnostic mechanism for communication devices

Publications (2)

Publication Number Publication Date
US20090024872A1 US20090024872A1 (en) 2009-01-22
US8543866B2 true US8543866B2 (en) 2013-09-24

Family

ID=40265832

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/174,278 Active 2030-08-10 US8543866B2 (en) 2007-07-20 2008-07-16 Remote access diagnostic mechanism for communication devices
US13/973,659 Active US8909978B2 (en) 2007-07-20 2013-08-22 Remote access diagnostic mechanism for communication devices

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/973,659 Active US8909978B2 (en) 2007-07-20 2013-08-22 Remote access diagnostic mechanism for communication devices

Country Status (4)

Country Link
US (2) US8543866B2 (en)
EP (1) EP2176755A4 (en)
KR (1) KR101540129B1 (en)
WO (1) WO2009014951A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130339782A1 (en) * 2007-07-20 2013-12-19 Qualcomm Incorporated Remote access diagnostic mechanism for communication
US9893952B2 (en) 2015-01-09 2018-02-13 Microsoft Technology Licensing, Llc Dynamic telemetry message profiling and adjustment

Families Citing this family (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4648961B2 (en) * 2008-03-25 2011-03-09 富士通株式会社 Apparatus maintenance system, method, and information processing apparatus
US20110041128A1 (en) * 2009-08-13 2011-02-17 Mathias Kohlenz Apparatus and Method for Distributed Data Processing
US9038073B2 (en) * 2009-08-13 2015-05-19 Qualcomm Incorporated Data mover moving data to accelerator for processing and returning result data based on instruction received from a processor utilizing software and hardware interrupts
US8762532B2 (en) * 2009-08-13 2014-06-24 Qualcomm Incorporated Apparatus and method for efficient memory allocation
US8788782B2 (en) * 2009-08-13 2014-07-22 Qualcomm Incorporated Apparatus and method for memory management and efficient data processing
DE102009047168B4 (en) * 2009-11-26 2012-11-08 Würth Elektronik Ics Gmbh & Co. Kg Electronic relay, electronic system and method for switching a power current
DE102009047171B4 (en) * 2009-11-26 2012-11-08 Würth Elektronik Ics Gmbh & Co. Kg Electronic relay, electronic system and method for switching a power current
US20110161721A1 (en) * 2009-12-30 2011-06-30 Dominic Fulginiti Method and system for achieving a remote control help session on a computing device
US20120272103A1 (en) * 2011-04-21 2012-10-25 Microsoft Corporation Software operability service
US9123035B2 (en) 2011-04-22 2015-09-01 Angel A. Penilla Electric vehicle (EV) range extending charge systems, distributed networks of charge kiosks, and charge locating mobile apps
US10217160B2 (en) 2012-04-22 2019-02-26 Emerging Automotive, Llc Methods and systems for processing charge availability and route paths for obtaining charge for electric vehicles
US9285944B1 (en) 2011-04-22 2016-03-15 Angel A. Penilla Methods and systems for defining custom vehicle user interface configurations and cloud services for managing applications for the user interface and learned setting functions
US10186094B2 (en) 2011-07-26 2019-01-22 Gogoro Inc. Apparatus, method and article for providing locations of power storage device collection, charging and distribution machines
CN103858305A (en) 2011-07-26 2014-06-11 Gogoro有限公司 Apparatus, method and article for reserving power storage devices at reserving power storage device collection, charging and distribution machines
TWI560637B (en) 2011-07-26 2016-12-01 Gogoro Inc Apparatus, method and article for providing information regarding availability of power storage devices at a power storage device collection, charging and distribution machine
JP2014525230A (en) 2011-07-26 2014-09-25 ゴゴロ インク Dynamic restrictions on vehicle behavior for the best effort economy
CN103891089B (en) 2011-07-26 2016-10-12 睿能创意公司 The device of certification, safety and control, method and article for the power storage device such as battery etc
EP2737600B1 (en) 2011-07-26 2018-10-03 Gogoro Inc. Apparatus, method and article for redistributing power storage devices, such as batteries, between collection, charging and distribution machines
ES2701751T3 (en) 2011-07-26 2019-02-25 Gogoro Inc Apparatus, method and article for authentication, security and control of energy storage devices, such as batteries, based on user profiles
TWI485572B (en) 2011-07-26 2015-05-21 睿能創意公司 Apparatus, method and article for physical security of power storage devices in vehicles
CN109649171A (en) * 2011-07-26 2019-04-19 睿能创意公司 For subscribing device, the method and article of electrical energy storage at the collection, charging and dispenser for subscribing electrical energy storage
TWI517078B (en) 2011-07-26 2016-01-11 睿能創意公司 Apparatus, method and article for a power storage device compartment
US8862388B2 (en) 2011-07-26 2014-10-14 Gogoro, Inc. Apparatus, method and article for providing locations of power storage device collection, charging and distribution machines
EP2737601B1 (en) 2011-07-26 2020-04-08 Gogoro Inc. Apparatus, method and article for collection, charging and distributing power storage devices, such as batteries
ITMI20111648A1 (en) * 2011-09-14 2013-03-15 Fassi Gru S P A ELECTRONIC SYSTEM FOR REMOTE MAINTENANCE OF A CRANE
US9413893B2 (en) 2012-04-05 2016-08-09 Assurant, Inc. System, method, apparatus, and computer program product for providing mobile device support services
US9483344B2 (en) * 2012-04-05 2016-11-01 Assurant, Inc. System, method, apparatus, and computer program product for providing mobile device support services
JP5721659B2 (en) * 2012-04-06 2015-05-20 キヤノン株式会社 Management device, management system, and control method
US8986300B2 (en) 2012-06-25 2015-03-24 Biosense Webster (Israel) Ltd. Irrigated electrodes with enhanced heat conduction
US20150249686A1 (en) * 2012-10-10 2015-09-03 Fortinet, Inc. Initial diagnostics of a network security device via a hand-held computing device
US9742872B2 (en) 2012-10-10 2017-08-22 Fortinet, Inc. Configuring initial settings of a network security device via a hand-held computing device
US8655952B1 (en) * 2012-10-19 2014-02-18 Google Inc. Automating help tasks across multiple devices
BR112015011290A2 (en) 2012-11-16 2017-07-11 Gogoro Inc apparatus, method and article for vehicle turn signaling
WO2014120205A1 (en) * 2013-01-31 2014-08-07 Hewlett-Packard Development Company, L.P. Replacement of a corrupt driver variable record
EP2973941A4 (en) 2013-03-12 2016-09-14 Gogoro Inc Apparatus, method and article for changing portable electrical power storage device exchange plans
US11222485B2 (en) 2013-03-12 2022-01-11 Gogoro Inc. Apparatus, method and article for providing information regarding a vehicle via a mobile device
US8798852B1 (en) 2013-03-14 2014-08-05 Gogoro, Inc. Apparatus, system, and method for authentication of vehicular components
CN105210257B (en) 2013-03-15 2018-11-13 睿能创意公司 Modular system for being collected and distributing to storage device electric
JP2014207558A (en) * 2013-04-12 2014-10-30 三菱電機株式会社 Remote management system, remote management apparatus, and home appliances
CN105705370B (en) 2013-08-06 2018-03-23 睿能创意公司 Based on the hot overview regulation electric vehicle system of apparatus for storing electrical energy
US9770996B2 (en) 2013-08-06 2017-09-26 Gogoro Inc. Systems and methods for powering electric vehicles using a single or multiple power cells
US9124085B2 (en) 2013-11-04 2015-09-01 Gogoro Inc. Apparatus, method and article for power storage device failure safety
JP6446045B2 (en) 2013-11-08 2018-12-26 ゴゴロ インク Apparatus, method and article for providing vehicle event data
ES2721000T3 (en) 2014-01-23 2019-07-26 Gogoro Inc Systems and methods for using a set of energy storage devices, such as batteries
WO2016025392A1 (en) 2014-08-11 2016-02-18 Gogoro Inc. Multidirectional electrical connector, plug and system
USD789883S1 (en) 2014-09-04 2017-06-20 Gogoro Inc. Collection, charging and distribution device for portable electrical energy storage devices
JP6887718B2 (en) 2015-06-05 2021-06-16 ゴゴロ インク How to determine a particular type of vehicle and electric vehicle load
JP2022122478A (en) * 2021-02-10 2022-08-23 株式会社日立製作所 Network interface of storage controller

Citations (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3838261A (en) * 1973-09-14 1974-09-24 Gte Automatic Electric Lab Inc Interrupt control circuit for central processor of digital communication system
US4057847A (en) 1976-06-14 1977-11-08 Sperry Rand Corporation Remote controlled test interface unit
US5353412A (en) 1990-10-03 1994-10-04 Thinking Machines Corporation Partition control circuit for separately controlling message sending of nodes of tree-shaped routing network to divide the network into a number of partitions
US5355371A (en) 1982-06-18 1994-10-11 International Business Machines Corp. Multicast communication tree creation and control method and apparatus
US5446741A (en) * 1990-08-02 1995-08-29 International Business Machines Corporation Fast memory power-on diagnostics using DMA
US5675736A (en) 1995-05-24 1997-10-07 International Business Machines Corporation Multi-node network with internode switching performed within processor nodes, each node separately processing data and control messages
US5771287A (en) 1996-08-01 1998-06-23 Transcrypt International, Inc. Apparatus and method for secured control of feature set of a programmable device
JPH10314451A (en) 1997-05-15 1998-12-02 Copcom Co Ltd Game device
US5890963A (en) 1996-09-30 1999-04-06 Yen; Wei System and method for maintaining continuous and progressive game play in a computer network
US5974567A (en) 1997-06-20 1999-10-26 Compaq Computer Corporation Ghost partition
US6015348A (en) 1996-10-18 2000-01-18 Starwave Corporation Scalable game server architecture
US6189117B1 (en) * 1998-08-18 2001-02-13 International Business Machines Corporation Error handling between a processor and a system managed by the processor
US6240517B1 (en) 1997-01-31 2001-05-29 Kabushiki Kaisha Toshiba Integrated circuit card, integrated circuit card processing system, and integrated circuit card authentication method
JP2001246147A (en) 1999-12-28 2001-09-11 Sega Corp Game facility administration system
US20010054161A1 (en) 1998-07-15 2001-12-20 Robert J Wooddruff Method and apparatus for performing field diagnostics on a computer system
US20020078223A1 (en) 2000-10-17 2002-06-20 Baldonado Omar C. Method and apparatus for performance and cost optimization in an internetwork
US6480972B1 (en) 1999-02-24 2002-11-12 International Business Machines Corporation Data processing system and method for permitting a server to remotely perform diagnostics on a malfunctioning client computer system
US20020180583A1 (en) 1999-10-19 2002-12-05 Setec Oy Authentication of subscriber station
US20020198932A1 (en) 2001-06-07 2002-12-26 Christopher Shaun Wagner System of server-client distributed computing using passive clients
US6601183B1 (en) * 1999-09-30 2003-07-29 Silicon Graphics, Inc. Diagnostic system and method for a highly scalable computing system
US6615218B2 (en) 1998-07-17 2003-09-02 Sun Microsystems, Inc. Database for executing policies for controlling devices on a network
US20030177187A1 (en) 2000-11-27 2003-09-18 Butterfly.Net. Inc. Computing grid for massively multi-player online games and other multi-user immersive persistent-state and session-based applications
US6625661B1 (en) 1999-06-21 2003-09-23 Kenneth G. Baldwin, Jr. Interactive entertainment system
US20030191857A1 (en) 2001-10-18 2003-10-09 Terrell William C. Router and methods using in-band link between managing processor and routing processor
DE10218795A1 (en) 2002-04-22 2003-11-06 Deutscher Sparkassen Verlag Gm Chip card or security module production method in which the chip producer writes an authentication code, such as a cryptographic key, into the chip's non-volatile memory so that the memory can only be accessed using the key
US20040003317A1 (en) * 2002-06-27 2004-01-01 Atul Kwatra Method and apparatus for implementing fault detection and correction in a computer system that requires high reliability and system manageability
US6691303B2 (en) * 1998-11-16 2004-02-10 Esmertec Ag Method and system of testing and verifying computer code in a multi-threaded environment
US20040068580A1 (en) 2002-10-07 2004-04-08 Ntt Docomo, Inc. Routing control system, routing control device, transfer device and routing control method
US20040073654A1 (en) * 2002-09-30 2004-04-15 Sarma Srinivas G. System and method for remote servicing of embedded devices
US6745236B1 (en) 1996-05-09 2004-06-01 William M. Hawkins, III Networked computer game system with persistent playing objects
US6763371B1 (en) 1999-05-10 2004-07-13 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for collaborative communication in a communication network
US20040153823A1 (en) * 2003-01-17 2004-08-05 Zubair Ansari System and method for active diagnosis and self healing of software systems
US6810528B1 (en) 1999-12-03 2004-10-26 Sony Computer Entertainment America Inc. System and method for providing an on-line gaming experience through a CATV broadband network
US20040230801A1 (en) 2003-03-14 2004-11-18 Sony Corporation Data processing device and method and program of same
US20040246905A1 (en) 2003-06-06 2004-12-09 Microsoft Corporation Method and system for global routing and bandwidth sharing
US20050107161A1 (en) 2002-02-01 2005-05-19 Jun Fujimoto Game execution system and game execution method
US6908389B1 (en) 2001-03-07 2005-06-21 Nokia Corporation Predefined messages for wireless multiplayer gaming
US6918042B1 (en) 1997-11-26 2005-07-12 International Business Machines Corporation Secure configuration of a digital certificate for a printer or other network device
US20050171661A1 (en) * 1999-10-28 2005-08-04 Aiman Abdel-Malek Diagnosis and repair system and method
US20050188073A1 (en) 2003-02-13 2005-08-25 Koji Nakamichi Transmission system, delivery path controller, load information collecting device, and delivery path controlling method
US6941353B1 (en) 2000-06-29 2005-09-06 Auran Holdings Pty Ltd E-commerce system and method relating to program objects
US20050210329A1 (en) * 2004-03-18 2005-09-22 Newisys, Inc. Facilitating system diagnostic functionality through selective quiescing of system component sensor devices
US20050235007A1 (en) * 2004-04-16 2005-10-20 International Business Machines Corporation Diagnostic repair system and method for computing systems
US6961852B2 (en) 2003-06-19 2005-11-01 International Business Machines Corporation System and method for authenticating software using hidden intermediate keys
US6988196B2 (en) 2000-12-22 2006-01-17 Lenovo (Singapore) Pte Ltd Computer system and method for generating a digital certificate
US7000115B2 (en) 2001-06-19 2006-02-14 International Business Machines Corporation Method and apparatus for uniquely and authoritatively identifying tangible objects
US7003548B1 (en) 1999-03-29 2006-02-21 Gelco Corporation Method and apparatus for developing and checking technical configurations of a product
US7046680B1 (en) 2000-11-28 2006-05-16 Mci, Inc. Network access system including a programmable access device having distributed service control
US7065756B2 (en) 2002-08-22 2006-06-20 International Business Machines Corporation Optimization of portable operations in a client-server environment
US20060259632A1 (en) 2005-05-13 2006-11-16 Yahoo! Inc. Redirection and invitation for accessing an online service
US20060259579A1 (en) 2005-05-11 2006-11-16 Bigfoot Networks, Inc. Distributed processing system and method
US7139780B2 (en) 2002-10-04 2006-11-21 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. System and method for synchronizing files in multiple nodes
US20070005986A1 (en) 2003-09-09 2007-01-04 Axalto S.A. Authentication method in data communication and smart card for implementing the same
US20070060373A1 (en) 2005-09-12 2007-03-15 Bigfoot Networks, Inc. Data communication system and methods
US20070086343A1 (en) 2005-10-14 2007-04-19 Michael Kujawa Selectively ordered protocol for unreliable channels
US7209449B2 (en) 2002-03-27 2007-04-24 Intel Corporation Systems and methods for updating routing and forwarding information
US20070101408A1 (en) 2005-10-31 2007-05-03 Nakhjiri Madjid F Method and apparatus for providing authorization material
US7249109B1 (en) 1997-07-15 2007-07-24 Silverbrook Research Pty Ltd Shielding manipulations of secret data
US20070189517A1 (en) 2004-12-20 2007-08-16 International Business Machines Corporation Pseudo public key encryption
US7266515B2 (en) * 2000-04-20 2007-09-04 General Electric Company Method and system for graphically identifying replacement parts for generally complex equipment
US7274702B2 (en) 2001-11-27 2007-09-25 4198638 Canada Inc. Programmable interconnect system for scalable router
US20070226498A1 (en) 1997-07-15 2007-09-27 Silverbrook Research Pty Ltd Validating Apparatus For Use With A Pair Of Integrated Circuits
US20070298879A1 (en) 2005-06-30 2007-12-27 Konami Digital Entertainment Co., Ltd. Game Device
US20070297405A1 (en) 2004-12-31 2007-12-27 Liwen He Method of Operating a Network
US20080010371A1 (en) 2002-02-01 2008-01-10 Masaya Yamamoto License information exchange system
US20080009337A1 (en) 2006-07-08 2008-01-10 Jackson Mark D Self-authenticating file system in an embedded gaming device
US20080009352A1 (en) 2006-07-06 2008-01-10 Kabushiki Kaisha Square Enix (Also Trading As Square Enix Co., Ltd.) Online video game control server and a method of controlling an online video game
US20080013551A1 (en) 2005-11-18 2008-01-17 Sbc Knowledge Ventures, L. P. Border gateway protocol (BGP) routing policy manager, relay, and monitor
US20080016236A1 (en) 2006-07-17 2008-01-17 Bigfoot Networks, Inc. Data buffering and notification system and methods thereof
US20080022389A1 (en) 2006-07-18 2008-01-24 Motorola, Inc. Method and apparatus for dynamic, seamless security in communication protocols
US20080039208A1 (en) 2006-07-31 2008-02-14 Ulf Abrink Information updating management in a gaming system
US20080045285A1 (en) 2006-08-21 2008-02-21 Kabushiki Kaisha Square Enix (Also Trading As Square Enix Co., Ltd.) Network breeding game system, breeding game server apparatus and breeding game terminal apparatus, character display method, together with program and recording medium
US20080049621A1 (en) 2004-12-31 2008-02-28 Mcguire Alan Connection-Oriented Communications Scheme For Connection-Less Communications Traffic

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6145096A (en) * 1998-05-06 2000-11-07 Motive Communications, Inc. Method, system and computer program product for iterative distributed problem solving
US6782496B2 (en) * 2001-04-13 2004-08-24 Hewlett-Packard Development Company, L.P. Adaptive heartbeats
JP4080980B2 (en) * 2003-09-26 2008-04-23 三菱電機株式会社 Electronic control unit
US7797566B2 (en) * 2006-07-11 2010-09-14 Check Point Software Technologies Ltd. Application cluster in security gateway for high availability and load sharing
KR101540129B1 (en) * 2007-07-20 2015-07-28 퀄컴 인코포레이티드 Remote access diagnostic device and methods thereof

Patent Citations (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3838261A (en) * 1973-09-14 1974-09-24 Gte Automatic Electric Lab Inc Interrupt control circuit for central processor of digital communication system
US4057847A (en) 1976-06-14 1977-11-08 Sperry Rand Corporation Remote controlled test interface unit
US5355371A (en) 1982-06-18 1994-10-11 International Business Machines Corp. Multicast communication tree creation and control method and apparatus
US5446741A (en) * 1990-08-02 1995-08-29 International Business Machines Corporation Fast memory power-on diagnostics using DMA
US5353412A (en) 1990-10-03 1994-10-04 Thinking Machines Corporation Partition control circuit for separately controlling message sending of nodes of tree-shaped routing network to divide the network into a number of partitions
US5675736A (en) 1995-05-24 1997-10-07 International Business Machines Corporation Multi-node network with internode switching performed within processor nodes, each node separately processing data and control messages
US6745236B1 (en) 1996-05-09 2004-06-01 William M. Hawkins, III Networked computer game system with persistent playing objects
US5771287A (en) 1996-08-01 1998-06-23 Transcrypt International, Inc. Apparatus and method for secured control of feature set of a programmable device
US5890963A (en) 1996-09-30 1999-04-06 Yen; Wei System and method for maintaining continuous and progressive game play in a computer network
US6015348A (en) 1996-10-18 2000-01-18 Starwave Corporation Scalable game server architecture
US6240517B1 (en) 1997-01-31 2001-05-29 Kabushiki Kaisha Toshiba Integrated circuit card, integrated circuit card processing system, and integrated circuit card authentication method
JPH10314451A (en) 1997-05-15 1998-12-02 Copcom Co Ltd Game device
US5974567A (en) 1997-06-20 1999-10-26 Compaq Computer Corporation Ghost partition
US7249109B1 (en) 1997-07-15 2007-07-24 Silverbrook Research Pty Ltd Shielding manipulations of secret data
US20070226498A1 (en) 1997-07-15 2007-09-27 Silverbrook Research Pty Ltd Validating Apparatus For Use With A Pair Of Integrated Circuits
US6918042B1 (en) 1997-11-26 2005-07-12 International Business Machines Corporation Secure configuration of a digital certificate for a printer or other network device
US20010054161A1 (en) 1998-07-15 2001-12-20 Robert J Wooddruff Method and apparatus for performing field diagnostics on a computer system
US6615218B2 (en) 1998-07-17 2003-09-02 Sun Microsystems, Inc. Database for executing policies for controlling devices on a network
US6189117B1 (en) * 1998-08-18 2001-02-13 International Business Machines Corporation Error handling between a processor and a system managed by the processor
US6691303B2 (en) * 1998-11-16 2004-02-10 Esmertec Ag Method and system of testing and verifying computer code in a multi-threaded environment
US6480972B1 (en) 1999-02-24 2002-11-12 International Business Machines Corporation Data processing system and method for permitting a server to remotely perform diagnostics on a malfunctioning client computer system
US7003548B1 (en) 1999-03-29 2006-02-21 Gelco Corporation Method and apparatus for developing and checking technical configurations of a product
US6763371B1 (en) 1999-05-10 2004-07-13 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for collaborative communication in a communication network
US6625661B1 (en) 1999-06-21 2003-09-23 Kenneth G. Baldwin, Jr. Interactive entertainment system
US6601183B1 (en) * 1999-09-30 2003-07-29 Silicon Graphics, Inc. Diagnostic system and method for a highly scalable computing system
US20020180583A1 (en) 1999-10-19 2002-12-05 Setec Oy Authentication of subscriber station
US20050171661A1 (en) * 1999-10-28 2005-08-04 Aiman Abdel-Malek Diagnosis and repair system and method
US6810528B1 (en) 1999-12-03 2004-10-26 Sony Computer Entertainment America Inc. System and method for providing an on-line gaming experience through a CATV broadband network
JP2001246147A (en) 1999-12-28 2001-09-11 Sega Corp Game facility administration system
US7266515B2 (en) * 2000-04-20 2007-09-04 General Electric Company Method and system for graphically identifying replacement parts for generally complex equipment
US6941353B1 (en) 2000-06-29 2005-09-06 Auran Holdings Pty Ltd E-commerce system and method relating to program objects
US20020078223A1 (en) 2000-10-17 2002-06-20 Baldonado Omar C. Method and apparatus for performance and cost optimization in an internetwork
US20030177187A1 (en) 2000-11-27 2003-09-18 Butterfly.Net. Inc. Computing grid for massively multi-player online games and other multi-user immersive persistent-state and session-based applications
US7046680B1 (en) 2000-11-28 2006-05-16 Mci, Inc. Network access system including a programmable access device having distributed service control
US6988196B2 (en) 2000-12-22 2006-01-17 Lenovo (Singapore) Pte Ltd Computer system and method for generating a digital certificate
US6908389B1 (en) 2001-03-07 2005-06-21 Nokia Corporation Predefined messages for wireless multiplayer gaming
US20020198932A1 (en) 2001-06-07 2002-12-26 Christopher Shaun Wagner System of server-client distributed computing using passive clients
US7000115B2 (en) 2001-06-19 2006-02-14 International Business Machines Corporation Method and apparatus for uniquely and authoritatively identifying tangible objects
US20030191857A1 (en) 2001-10-18 2003-10-09 Terrell William C. Router and methods using in-band link between managing processor and routing processor
US7274702B2 (en) 2001-11-27 2007-09-25 4198638 Canada Inc. Programmable interconnect system for scalable router
US20050107161A1 (en) 2002-02-01 2005-05-19 Jun Fujimoto Game execution system and game execution method
US20080010371A1 (en) 2002-02-01 2008-01-10 Masaya Yamamoto License information exchange system
US7209449B2 (en) 2002-03-27 2007-04-24 Intel Corporation Systems and methods for updating routing and forwarding information
DE10218795A1 (en) 2002-04-22 2003-11-06 Deutscher Sparkassen Verlag Gm Chip card or security module production method in which the chip producer writes an authentication code, such as a cryptographic key, into the chip's non-volatile memory so that the memory can only be accessed using the key
US20040003317A1 (en) * 2002-06-27 2004-01-01 Atul Kwatra Method and apparatus for implementing fault detection and correction in a computer system that requires high reliability and system manageability
US7065756B2 (en) 2002-08-22 2006-06-20 International Business Machines Corporation Optimization of portable operations in a client-server environment
US20040073654A1 (en) * 2002-09-30 2004-04-15 Sarma Srinivas G. System and method for remote servicing of embedded devices
US7139780B2 (en) 2002-10-04 2006-11-21 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. System and method for synchronizing files in multiple nodes
US20040068580A1 (en) 2002-10-07 2004-04-08 Ntt Docomo, Inc. Routing control system, routing control device, transfer device and routing control method
US20040153823A1 (en) * 2003-01-17 2004-08-05 Zubair Ansari System and method for active diagnosis and self healing of software systems
US20050188073A1 (en) 2003-02-13 2005-08-25 Koji Nakamichi Transmission system, delivery path controller, load information collecting device, and delivery path controlling method
US20040230801A1 (en) 2003-03-14 2004-11-18 Sony Corporation Data processing device and method and program of same
US20040246905A1 (en) 2003-06-06 2004-12-09 Microsoft Corporation Method and system for global routing and bandwidth sharing
US6961852B2 (en) 2003-06-19 2005-11-01 International Business Machines Corporation System and method for authenticating software using hidden intermediate keys
US20070005986A1 (en) 2003-09-09 2007-01-04 Axalto S.A. Authentication method in data communication and smart card for implementing the same
US20050210329A1 (en) * 2004-03-18 2005-09-22 Newisys, Inc. Facilitating system diagnostic functionality through selective quiescing of system component sensor devices
US20050235007A1 (en) * 2004-04-16 2005-10-20 International Business Machines Corporation Diagnostic repair system and method for computing systems
US20070189517A1 (en) 2004-12-20 2007-08-16 International Business Machines Corporation Pseudo public key encryption
US20070297405A1 (en) 2004-12-31 2007-12-27 Liwen He Method of Operating a Network
US20080049621A1 (en) 2004-12-31 2008-02-28 Mcguire Alan Connection-Oriented Communications Scheme For Connection-Less Communications Traffic
US20060259579A1 (en) 2005-05-11 2006-11-16 Bigfoot Networks, Inc. Distributed processing system and method
US20060259632A1 (en) 2005-05-13 2006-11-16 Yahoo! Inc. Redirection and invitation for accessing an online service
US20070298879A1 (en) 2005-06-30 2007-12-27 Konami Digital Entertainment Co., Ltd. Game Device
US20070060373A1 (en) 2005-09-12 2007-03-15 Bigfoot Networks, Inc. Data communication system and methods
US20070086343A1 (en) 2005-10-14 2007-04-19 Michael Kujawa Selectively ordered protocol for unreliable channels
US20070101408A1 (en) 2005-10-31 2007-05-03 Nakhjiri Madjid F Method and apparatus for providing authorization material
US20080013551A1 (en) 2005-11-18 2008-01-17 Sbc Knowledge Ventures, L. P. Border gateway protocol (BGP) routing policy manager, relay, and monitor
US20080009352A1 (en) 2006-07-06 2008-01-10 Kabushiki Kaisha Square Enix (Also Trading As Square Enix Co., Ltd.) Online video game control server and a method of controlling an online video game
US20080009337A1 (en) 2006-07-08 2008-01-10 Jackson Mark D Self-authenticating file system in an embedded gaming device
US20080016236A1 (en) 2006-07-17 2008-01-17 Bigfoot Networks, Inc. Data buffering and notification system and methods thereof
US20080022389A1 (en) 2006-07-18 2008-01-24 Motorola, Inc. Method and apparatus for dynamic, seamless security in communication protocols
US20080039208A1 (en) 2006-07-31 2008-02-14 Ulf Abrink Information updating management in a gaming system
US20080045285A1 (en) 2006-08-21 2008-02-21 Kabushiki Kaisha Square Enix (Also Trading As Square Enix Co., Ltd.) Network breeding game system, breeding game server apparatus and breeding game terminal apparatus, character display method, together with program and recording medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
PCT International Search Report, Oct. 6, 2008, 4 pages.
Supplementary European Search Report-EP08826581-Search Authority-Munich-Dec. 19, 2012.
Supplementary European Search Report—EP08826581—Search Authority—Munich—Dec. 19, 2012.
Written Opinion-PCT/US2008/070160-ISA/EPO-Oct. 6, 2008.
Written Opinion—PCT/US2008/070160—ISA/EPO—Oct. 6, 2008.

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130339782A1 (en) * 2007-07-20 2013-12-19 Qualcomm Incorporated Remote access diagnostic mechanism for communication
US8909978B2 (en) * 2007-07-20 2014-12-09 Qualcomm Incorporated Remote access diagnostic mechanism for communication devices
US9893952B2 (en) 2015-01-09 2018-02-13 Microsoft Technology Licensing, Llc Dynamic telemetry message profiling and adjustment

Also Published As

Publication number Publication date
US20090024872A1 (en) 2009-01-22
US8909978B2 (en) 2014-12-09
KR101540129B1 (en) 2015-07-28
KR20100054805A (en) 2010-05-25
WO2009014951A1 (en) 2009-01-29
US20130339782A1 (en) 2013-12-19
EP2176755A4 (en) 2013-01-23
EP2176755A1 (en) 2010-04-21

Similar Documents

Publication Publication Date Title
US8543866B2 (en) Remote access diagnostic mechanism for communication devices
US11686767B2 (en) System, apparatus and method for functional testing of one or more fabrics of a processor
JP6385842B2 (en) Information processing terminal, information processing method, and information processing system
CN108292342B (en) Notification of intrusions into firmware
US10445503B2 (en) Secure persistent software updates
US10102088B2 (en) Cluster system, server device, cluster system management method, and computer-readable recording medium
CN101369141A (en) Protection unit for a programmable data processing unit
US10289510B1 (en) Intelligent platform management interface functional fuzzer
US20090144332A1 (en) Sideband access based method and apparatus for determining software integrity
JP5689783B2 (en) Computer, computer system, and failure information management method
US20070226549A1 (en) Apparatus for detecting errors in a communication system
US11714696B2 (en) Custom baseboard management controller (BMC) firmware stack watchdog system and method
US11797679B2 (en) Trust verification system and method for a baseboard management controller (BMC)
US11755404B2 (en) Custom baseboard management controller (BMC) firmware stack monitoring system and method
JP7383589B2 (en) information processing equipment
EP4042306B1 (en) Secure installation of baseboard management controller firmware via a physical interface
JP5955165B2 (en) Management apparatus, management method, and management program
KR20170070568A (en) System and method for managing servers totally
EP3661149A1 (en) Test system and method for data analytics
US11593490B2 (en) System and method for maintaining trusted execution in an untrusted computing environment using a secure communication channel
US7500154B2 (en) Method and system for generating a console log
CN107451035B (en) Error state data providing method for computer device
US20230161599A1 (en) Redundant data log retrieval in multi-processor device
JP2002149503A (en) Method for diagnosing auxiliary storage part, information processor and storage medium with stored diagnostic procedure of auxiliary storage part

Legal Events

Date Code Title Description
AS Assignment

Owner name: BIGFOOT NETWORKS, INC.., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BEVERLY, HARLAN T.;REEL/FRAME:021254/0738

Effective date: 20080714

AS Assignment

Owner name: QUALCOMM ATHEROS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BIGFOOT NETWORKS, INC.;REEL/FRAME:026990/0280

Effective date: 20110831

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: QUALCOMM INCORPORATED, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:QUALCOMM ATHEROS, INC.;REEL/FRAME:029503/0936

Effective date: 20121022

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8